mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/06/29 12:28:50
This commit is contained in:
parent
7965657f2f
commit
df1ec84110
28 changed files with 153 additions and 114 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-30T16:32:13Z",
|
||||
"updated_at": "2024-05-06T15:45:47Z",
|
||||
"updated_at": "2024-06-29T10:30:11Z",
|
||||
"pushed_at": "2020-01-12T02:34:45Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2024-06-27T06:11:03Z",
|
||||
"updated_at": "2024-06-29T10:48:28Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1706,
|
||||
"watchers_count": 1706,
|
||||
"stargazers_count": 1707,
|
||||
"watchers_count": 1707,
|
||||
"has_discussions": false,
|
||||
"forks_count": 359,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 359,
|
||||
"watchers": 1706,
|
||||
"watchers": 1707,
|
||||
"score": 0,
|
||||
"subscribers_count": 87
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-06-28T10:56:41Z",
|
||||
"updated_at": "2024-06-29T12:15:52Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1273,
|
||||
"watchers_count": 1273,
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"watchers": 1273,
|
||||
"watchers": 1274,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
}
|
||||
|
|
|
@ -133,12 +133,12 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2024-06-20T09:39:28Z",
|
||||
"updated_at": "2024-06-29T09:18:00Z",
|
||||
"pushed_at": "2022-11-16T08:14:33Z",
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -146,8 +146,8 @@
|
|||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 256,
|
||||
"forks": 99,
|
||||
"watchers": 257,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2024-05-29T17:01:46Z",
|
||||
"updated_at": "2024-06-29T11:29:53Z",
|
||||
"pushed_at": "2022-01-16T02:09:46Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"has_discussions": false,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 203,
|
||||
"watchers": 204,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-06-24T17:45:09Z",
|
||||
"updated_at": "2024-06-29T10:39:26Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1768,
|
||||
"watchers_count": 1768,
|
||||
"stargazers_count": 1769,
|
||||
"watchers_count": 1769,
|
||||
"has_discussions": false,
|
||||
"forks_count": 521,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 521,
|
||||
"watchers": 1768,
|
||||
"watchers": 1769,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
@ -1268,10 +1268,10 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2024-06-28T09:55:03Z",
|
||||
"updated_at": "2024-06-29T06:57:18Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 790,
|
||||
"watchers_count": 790,
|
||||
"stargazers_count": 791,
|
||||
"watchers_count": 791,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 790,
|
||||
"watchers": 791,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2024-06-13T03:39:03Z",
|
||||
"updated_at": "2024-06-29T09:34:07Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 264,
|
||||
"watchers": 265,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -153,10 +153,10 @@
|
|||
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T15:42:37Z",
|
||||
"updated_at": "2024-01-26T09:40:56Z",
|
||||
"updated_at": "2024-06-29T08:44:53Z",
|
||||
"pushed_at": "2024-03-16T08:26:06Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -172,7 +172,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 78,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-06-28T10:56:41Z",
|
||||
"updated_at": "2024-06-29T12:15:52Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1273,
|
||||
"watchers_count": 1273,
|
||||
"stargazers_count": 1274,
|
||||
"watchers_count": 1274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"watchers": 1273,
|
||||
"watchers": 1274,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -86,13 +86,13 @@
|
|||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"forks": 28,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2024-06-25T02:50:46Z",
|
||||
"updated_at": "2024-06-29T09:45:39Z",
|
||||
"pushed_at": "2022-09-19T19:41:34Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 270,
|
||||
"watchers": 271,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-2255 Libre Office ",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-10T20:54:56Z",
|
||||
"updated_at": "2024-06-27T13:11:59Z",
|
||||
"updated_at": "2024-06-29T08:16:18Z",
|
||||
"pushed_at": "2023-07-10T21:00:09Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 42,
|
||||
"forks": 9,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
"stargazers_count": 261,
|
||||
"watchers_count": 261,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -66,7 +66,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 35,
|
||||
"watchers": 261,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "A Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-07T13:25:55Z",
|
||||
"updated_at": "2023-11-02T19:30:08Z",
|
||||
"updated_at": "2024-06-29T06:53:01Z",
|
||||
"pushed_at": "2023-09-07T13:27:09Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -380,8 +380,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-29T06:31:17Z",
|
||||
"updated_at": "2024-06-29T06:31:20Z",
|
||||
"pushed_at": "2024-06-29T06:31:17Z",
|
||||
"updated_at": "2024-06-29T07:26:05Z",
|
||||
"pushed_at": "2024-06-29T07:26:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-06-28T14:31:16Z",
|
||||
"updated_at": "2024-06-29T09:57:27Z",
|
||||
"pushed_at": "2024-06-19T04:31:02Z",
|
||||
"stargazers_count": 942,
|
||||
"watchers_count": 942,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-52251 There is a Remote Code Execution vulnerability provectus\/kafka-ui.",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-06T11:07:36Z",
|
||||
"updated_at": "2024-06-25T08:40:35Z",
|
||||
"updated_at": "2024-06-29T10:27:37Z",
|
||||
"pushed_at": "2024-01-23T19:06:14Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-18T09:22:59Z",
|
||||
"updated_at": "2024-06-28T22:19:17Z",
|
||||
"updated_at": "2024-06-29T12:17:17Z",
|
||||
"pushed_at": "2024-06-18T09:35:44Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-06-28T22:22:13Z",
|
||||
"updated_at": "2024-06-29T10:35:27Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2154,
|
||||
"watchers_count": 2154,
|
||||
"stargazers_count": 2155,
|
||||
"watchers_count": 2155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 282,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 282,
|
||||
"watchers": 2154,
|
||||
"watchers": 2155,
|
||||
"score": 0,
|
||||
"subscribers_count": 24
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T15:17:59Z",
|
||||
"updated_at": "2024-06-28T01:51:46Z",
|
||||
"updated_at": "2024-06-29T07:09:36Z",
|
||||
"pushed_at": "2024-02-19T20:00:35Z",
|
||||
"stargazers_count": 640,
|
||||
"watchers_count": 640,
|
||||
"stargazers_count": 641,
|
||||
"watchers_count": 641,
|
||||
"has_discussions": false,
|
||||
"forks_count": 142,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 142,
|
||||
"watchers": 640,
|
||||
"watchers": 641,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
32
2024/CVE-2024-22853.json
Normal file
32
2024/CVE-2024-22853.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 821748358,
|
||||
"name": "CVE-2024-22853",
|
||||
"full_name": "FaLLenSKiLL1\/CVE-2024-22853",
|
||||
"owner": {
|
||||
"login": "FaLLenSKiLL1",
|
||||
"id": 43922662,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43922662?v=4",
|
||||
"html_url": "https:\/\/github.com\/FaLLenSKiLL1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FaLLenSKiLL1\/CVE-2024-22853",
|
||||
"description": "D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-29T10:21:11Z",
|
||||
"updated_at": "2024-06-29T10:26:52Z",
|
||||
"pushed_at": "2024-06-29T10:26:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-06-26T22:40:24Z",
|
||||
"updated_at": "2024-06-29T08:09:32Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T11:11:16Z",
|
||||
"updated_at": "2024-06-29T04:09:56Z",
|
||||
"updated_at": "2024-06-29T09:24:04Z",
|
||||
"pushed_at": "2024-06-13T07:30:48Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 220,
|
||||
"watchers": 221,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-06-24T10:37:26Z",
|
||||
"updated_at": "2024-06-29T04:40:30Z",
|
||||
"updated_at": "2024-06-29T07:19:55Z",
|
||||
"pushed_at": "2024-06-24T11:16:26Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-34102: Unauthenticated Magento XXE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T18:10:13Z",
|
||||
"updated_at": "2024-06-29T00:24:30Z",
|
||||
"updated_at": "2024-06-29T08:57:16Z",
|
||||
"pushed_at": "2024-06-27T18:43:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -73,19 +73,19 @@
|
|||
"description": "POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento \/ Adobe Commerce. ",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-27T21:57:24Z",
|
||||
"updated_at": "2024-06-28T19:04:48Z",
|
||||
"pushed_at": "2024-06-28T19:04:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2024-06-29T11:41:23Z",
|
||||
"pushed_at": "2024-06-29T08:13:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -223,8 +223,8 @@
|
|||
"description": "TEST CVE-2024-34102 Magento XXE",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-29T06:00:46Z",
|
||||
"updated_at": "2024-06-29T06:32:21Z",
|
||||
"pushed_at": "2024-06-29T06:32:18Z",
|
||||
"updated_at": "2024-06-29T06:38:25Z",
|
||||
"pushed_at": "2024-06-29T06:38:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-37051 poc and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-11T16:01:13Z",
|
||||
"updated_at": "2024-06-26T16:44:47Z",
|
||||
"updated_at": "2024-06-29T10:28:42Z",
|
||||
"pushed_at": "2024-06-11T19:02:40Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -934,10 +934,10 @@
|
|||
"description": "Argument injection vulnerability in PHP",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-15T02:49:37Z",
|
||||
"updated_at": "2024-06-17T19:33:21Z",
|
||||
"updated_at": "2024-06-29T09:15:45Z",
|
||||
"pushed_at": "2024-06-15T02:57:48Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -946,7 +946,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -1144,8 +1144,8 @@
|
|||
"description": "Create lab for CVE-2024-4577",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-28T14:11:15Z",
|
||||
"updated_at": "2024-06-28T14:53:46Z",
|
||||
"pushed_at": "2024-06-28T14:52:25Z",
|
||||
"updated_at": "2024-06-29T10:39:34Z",
|
||||
"pushed_at": "2024-06-29T10:39:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1231,6 +1231,13 @@
|
|||
|
||||
- [Gray-0men/CVE-2024-22774](https://github.com/Gray-0men/CVE-2024-22774)
|
||||
|
||||
### CVE-2024-22853 (2024-02-06)
|
||||
|
||||
<code>D-LINK Go-RT-AC750 GORTAC750_A1_FW_v101b03 has a hardcoded password for the Alphanetworks account, which allows remote attackers to obtain root access via a telnet session.
|
||||
</code>
|
||||
|
||||
- [FaLLenSKiLL1/CVE-2024-22853](https://github.com/FaLLenSKiLL1/CVE-2024-22853)
|
||||
|
||||
### CVE-2024-22867
|
||||
- [brandon-t-elliott/CVE-2024-22867](https://github.com/brandon-t-elliott/CVE-2024-22867)
|
||||
|
||||
|
|
Loading…
Reference in a new issue